Revelations by Edward Snowden, National Security Agency dissident, have grave implications for the role of journalists in the ‘Fourth Estate’ and the primary duty of source protection in the era of mass-surveillance.
Should All Personal Information Be Encrypted? | Adam Levin
As we roll out the technology to implement the Affordable Care Act -- with millions of Americans signing up for the first time -- attempts to find and exploit weaknesses in the system are bound to increase.
Schools across the country are looking at new online ways to integrate and analyze information about their students. But privacy advocates remain wary.
Around the Corner-MGuhlin.org: Open Source Encryption Tools to Protect #Pri
I was totally unprepared for today’s bombshell revelations describing the NSA’s efforts to defeat encryption. Not only does the worst possible hypothetical I discussed appear to be…
‘Innate need for privacy’: Rick Falkvinge talks freedom and surveillance
The difference between privacy and anonymity, Internet freedom and NSA surveillance, and the future of the web - at RT’s Google Hangout, Rick Falkvinge answers the most pressing questions that concern all Internet users in their everyday lives.
By Jacob Sullum - President Obama claims he welcomes the public debate over government surveillance programs that track personal information about millions of innocent Americans. But if it were up to him, the debate never would have happened, since the programs would have remained secret. Furthermore, his administration is treating the whistleblower who made the debate possible as...
Schneier on Security: Senator Feinstein Admits the NSA Taps the Internet Ba
We know from the Snowden documents (and other sources) that the NSA taps the Internet backbone through secret agreements with major US telcos., but the US government still hasn’t admitted it. In late August, the Obama administration declassified a ruling from the Foreign Intelligence Surveillance Court. Footnote 3 reads: The term ‘upstream collection’ refers to NSA’s interception of Internet communications as they transit [LONG REDACTED CLAUSE], [REDACTED], rather than to acquisitions directly from Internet service providers such as [LIST OF REDACTED THINGS, PRESUMABLY THE PRISM DOWNSTREAM COMPANIES]...
Tomgram: Calabrese and Harwood, Privacy Down the Drain
For at least the last six years, government agents have been exploiting an AT&T database filled with the records of billions of American phone calls from as far back as 1987. The rationale
Alien-Level Tech Required To Crack New VPN Encryption Setup, Makers Say
In the wake of the Edward Snowden NSA revelations the use of encryption has become an extremely hot topic. Demand for anonymity tools has increased rapidly and providers are offering better services to satisfy that demand. Today we bring news of a new VPN client from Private Internet Access, one containing features that if regularly configured correctly would require "advanced alien technology" to crack.
How To Make Your Entire Internet Life More Secure In One Day
Yahoo! Calendar has a nifty little reminder feature that will send a message to your phone, instant messenger or email address a given time period before an event.Thanks to Catholic school, I can still conjugate certain Latin verbs by heart. But remembering my brother's birthday? Always a challenge.